Medium

Available on

Apple Android Windows

Systems Security Checklist Mobile App

The Systems Security Checklist mobile app highlights the types of measures that must be implemented, to begin to ensure that your small business systems are secure. This app helps you safeguard your assets while working closely with your staff.

  • Lendlease
  • The Cooperative
  • PG&E
  • Red Bull
  • Mirvac

Want to learn more about GoCanvas?

Request a Demo

Take a peek inside the Systems Security Checklist Mobile App

Included Features

Our App Builder gives you the power to easily add and remove the ones you want. {{controller.show_all ? 'See included features.' : 'See more features.'}}

  • {{data.title}}

Included Fields

Customize to add, remove, or edit any of the fields below.

  • Ico checkbox

    Is a qualified patch management process in place for all workstations and servers?

  • Ico checkbox

    What type of user identification, authentication and authorization process controls are in place ...

  • Ico checkbox

    Are application security controls in place?

  • Ico checkbox

    Are wireless network access points necessary?

  • Ico checkbox

    Are sensitive data exchanges secured and are data classification levels on critical databases enf...

  • Ico checkbox

    Are data or email encryption technologies in place to protect sensitive information leaving your ...

  • Ico checkbox

    Are intrusion prevention controls in place across the network?

  • Ico checkbox

    Are the NAC (network access control) hardware and policies valid and reliable?

  • Ico checkbox

    Is the firewall administration outsourced?

  • Ico checkbox

    Are there any types of intrusion detection system (IDS) or intrusion prevention systems (IPS) pre...

  • Ico checkbox

    Are incident response procedures currently in place?

  • Ico checkbox

    Are procedures—including appliance and device documentation—documented and provided for secure, o...

  • Ico checkbox

    Are response methods (i.

  • Ico checkbox

    Are network administration capabilities controlled by only qualified network administrators?

  • Ico checkbox

    Are network administrators monitored for their activity?

  • Ico checkbox

    Are network administrators monitored for their activity?

  • Ico checkbox

    Are IT protocols in place and exercised when employees are terminated (i.

  • ...and More!

Related Other Services Apps... and they're all free for GoCanvas subscribers!

App Name

Security Audit: Property Controls

The Security Audit: Property Controls mobile app is part of a security assessment. The app can be completed as a self insp...

App Name

Security Audit: Shipping and Receiving

The Security Audit: Shipping and Receiving mobile app is part of a security assessment. The app can be completed as a self...

App Name

Security Audit: Lightening

The Security Audit: Lightening mobile app is part of a security assessment. The app can be completed as a self inspection ...

App Name

Security Audit: Exterior Windows

The Security Audit: Exterior Windows mobile app is part of a security assessment. The app can be completed as a self inspe...

App Name

Security Audit: Controls

The Security Audit: Controls mobile app is part of a security assessment. The app can be completed as a self inspection or...

App Name

Operational Security Checklist

The Operational Security Checklist mobile app is designed for small business owners, primarily family owned and operated b...

App Name

Security Authorization Form

The Select Security Form mobile app is used for authorizing security upgrades for business and institutions. This app can ...

App Name

Neighborhood Watch Program: Home Secu...

An important step in preventing home burglary and other crimes is to make sure that a residence is as secure as possible. ...